Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Emotet and Qbot in s ...

 Business

Our experts have detected significant growth in complex malicious spam e-mails targeting organizations in various countries. The number of these malicious e-mails grew from around 3000 in February 2022 to approximately 30,000 in March. So far, our technologies have detected malicious e-mails written in English,   show more ...

French, Hungarian, Italian, Norwegian, Polish, Russian, Slovenian and Spanish languages. How cybercriminals infect victims devices Cybercriminals allegedly intercept active e-mail conversations on business matters and send the recipients an e-mail containing either a malicious file or a link in order to infect their devices with a banking trojan. Such scheme makes those messages harder to detect and increases the chances that recipient will fall for the trick. Some letters that cybercriminals send to the recipients contains a malicious attachment. In other cases, it has a link which leads to a file placed in a legitimate popular cloud-hosting service. Often, malware is contained in an encrypted archive, with the password mentioned in the e-mail body. To convince users to open attachment or download the file via the link, the attackers usually state that it contains some important information, such as a commercial offer. Our experts have concluded that these e-mails are being distributed as part of a coordinated campaign that aims to spread banking Trojans. What kind of malware attackers are using and how dangerous are they? In most cases when victims opens a malicious document, it downloads and launches the Qbot malware, but our experts has also observed that some of these documents download Emotet instead. Both malware strains are capable of stealing users data, collecting data on an infected corporate network, spreading further in the network, and installing ransomware or other Trojans on other network devices. Qbot also can access and steal e-mails. How to stay safe In order to stay safe from attacks by Qbot and Emotet (or any other malware spreading via e-mail), we recommend the following: Installing a reliable security solution on a mail gateway level — it will automatically filter out spam and malicious messages before end-users even have a chance to make a mistake. Providing your staff with basic cybersecurity hygiene training — it can teach them to spot cybercriminal behavior (for example to know that password in the same e-mail with the encrypted archive can serve only one purpose — to deceive antimalware technologies). Conducting simulated attacks to ensure that your employees know how to distinguish phishing and malicious e-mails and genuine ones. Using a security solution on every endpoint that is connected to the Internet. In this case if your staff fall victim to an attack, it can prevent a file from opening or a malicious link from working.

image for Episode 237: Jacked  ...

 Beanstalk

The hack of Beanstalk is just the latest major compromise of a decentralized finance (DeFi) platform. In this podcast, Jennifer Fernick of NCC Group joins me to talk about why DeFi’s security woes are much bigger than Beanstalk. The post Episode 237: Jacked on the Beanstalk – DeFi’s Security Debt Runs Wide,   show more ...

Deep appeared first on The...Read the whole entry... » Click the icon below to listen. Related StoriesSpotlight: How Secrets Sprawl Undermines Software Supply Chain SecurityEpisode 230: Are Vaccine Passports Cyber Secure?Episode 235: Justine Bone of MedSec on Healthcare Insecurity

 Expert Blogs and Opinion

To provide defense in depth, the principles of zero-trust architecture, as elaborated by NIST, need to be adopted in system design and operation. Data should be protected across all three phases of its lifecycle: at rest, in motion, and in use.

 Malware and Vulnerabilities

ZingoStealer targets multiple apps/wallets such as Chrome, Opera, TronLink, Zcash, Bitcoin, Armory, BitApp, and Nifty Wallet. Further, it attempts to steal various computer information such as IP, computer name, and OS version, among others.

 Expert Blogs and Opinion

Attacks that exploit QR codes are known as ‘Qshing’ (QR code phishing). In January 2022, the U.S. Federal Bureau of Investigation (FBI) warned QR code users about tampering and cited increased reports of stolen credentials and monetary loss.

 Trends, Reports, Analysis

Last year, more than $3 billion worth of digital assets were stolen. In Q1 2022, over $1.3 billion has already been stolen, indicating that the path taken by cybercriminals is even more aggressive this year.

 Identity Theft, Fraud, Scams

In 2021, approximately 20,000 people fell victim to RAT scams, as per a report by the U.K's Action Fraud. Collectively, they lost $75 million. The U.S. lost around $2.4 billion to BEC scams in 2021, a 33% increase from 2020.

 Malware and Vulnerabilities

Night Sky was discovered to be a fork of a ransomware family called Rook, which was itself derived from the leaked source code of Babuk and deployed by the same threat actor that used LockFile and AtomSilo, which share the same decryption tool.

 Feed

BlueZ suffers from a vulnerability where a malicious USB device can steal Bluetooth link keys over HCI using a fake BD_ADDR. It was also discovered that bluetoothd suffers from a double-free memory corruption flaw.

 Feed

Responsive Online Blog version 1.0 remote blind boolean-based SQL injection exploit that retrieves usernames and md5 hashes for all site users. Original discovery of the vulnerability is attributed to Eren Simsek.

 Feed

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), along with the Federal Bureau of Investigation (FBI) and the Treasury Department, warned of a new set of ongoing cyber attacks carried out by the Lazarus Group targeting blockchain companies. Calling the activity cluster TraderTraitor, the infiltrations involve the North Korean state-sponsored advanced persistent threat (APT)

 Feed

GitHub on Monday noted that it had notified all victims of an attack campaign, which involved an unauthorized party downloading private repository contents by taking advantage of third-party OAuth user tokens maintained by Heroku and Travis CI. "Customers should also continue to monitor Heroku and Travis CI for updates on their own investigations into the affected OAuth applications," the

 Feed

Three high-impact Unified Extensible Firmware Interface (UEFI) security vulnerabilities have been discovered impacting various Lenovo consumer laptop models, enabling malicious actors to deploy and execute firmware implants on the affected devices. Tracked as CVE-2021-3970, CVE-2021-3971, and CVE-2021-3972, the latter two "affect firmware drivers originally meant to be used only during the

 Feed

A previously unknown zero-click exploit in Apple's iMessage was used to install mercenary spyware from NSO Group and Candiru against at least 65 individuals as part of a "multi-year clandestine operation." "Victims included Members of the European Parliament, Catalan Presidents, legislators,   show more ...

jurists, and members of civil society organizations," the University of Toronto's Citizen Lab said in a

 Data loss

Online greeting cards business Funky Pigeon was forced to close its doors temporarily last week after a "cybersecurity incident." Visitors to the company's website were still being greeted as recently as Monday with a message saying that it could not accept new orders.

 Feed only

Graham Cluley Security News is sponsored this week by the folks at Indusface. Thanks to the great team there for their support! With APIs grown into a dominant mechanism of the modern web, protecting web applications and APIs becomes the default requirement of AppSec. This calls for a unified risk-based mitigation   show more ...

solution. Indusface WAAP, a … Continue reading "For cutting-edge web application and API protection – Trust Indusface WAAP"

2022-04
FRI
SAT
SUN
MON
TUE
WED
THU
AprilMayJune